158f0484fSRodney W. Grimes.\" Copyright (c) 1990, 1993 258f0484fSRodney W. Grimes.\" The Regents of the University of California. All rights reserved. 358f0484fSRodney W. Grimes.\" 458f0484fSRodney W. Grimes.\" Redistribution and use in source and binary forms, with or without 558f0484fSRodney W. Grimes.\" modification, are permitted provided that the following conditions 658f0484fSRodney W. Grimes.\" are met: 758f0484fSRodney W. Grimes.\" 1. Redistributions of source code must retain the above copyright 858f0484fSRodney W. Grimes.\" notice, this list of conditions and the following disclaimer. 958f0484fSRodney W. Grimes.\" 2. Redistributions in binary form must reproduce the above copyright 1058f0484fSRodney W. Grimes.\" notice, this list of conditions and the following disclaimer in the 1158f0484fSRodney W. Grimes.\" documentation and/or other materials provided with the distribution. 12*fbbd9655SWarner Losh.\" 3. Neither the name of the University nor the names of its contributors 1358f0484fSRodney W. Grimes.\" may be used to endorse or promote products derived from this software 1458f0484fSRodney W. Grimes.\" without specific prior written permission. 1558f0484fSRodney W. Grimes.\" 1658f0484fSRodney W. Grimes.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 1758f0484fSRodney W. Grimes.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 1858f0484fSRodney W. Grimes.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 1958f0484fSRodney W. Grimes.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 2058f0484fSRodney W. Grimes.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 2158f0484fSRodney W. Grimes.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 2258f0484fSRodney W. Grimes.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 2358f0484fSRodney W. Grimes.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 2458f0484fSRodney W. Grimes.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 2558f0484fSRodney W. Grimes.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 2658f0484fSRodney W. Grimes.\" SUCH DAMAGE. 2758f0484fSRodney W. Grimes.\" 28d74f3e32SRuslan Ermilov.Dd August 18, 1994 29d74f3e32SRuslan Ermilov.Dt HASH 3 30d74f3e32SRuslan Ermilov.Os 31d74f3e32SRuslan Ermilov.Sh NAME 32d74f3e32SRuslan Ermilov.Nm hash 33d74f3e32SRuslan Ermilov.Nd "hash database access method" 34d74f3e32SRuslan Ermilov.Sh SYNOPSIS 3532eef9aeSRuslan Ermilov.In sys/types.h 3632eef9aeSRuslan Ermilov.In db.h 37d74f3e32SRuslan Ermilov.Sh DESCRIPTION 3858f0484fSRodney W. GrimesThe routine 39d74f3e32SRuslan Ermilov.Fn dbopen 4058f0484fSRodney W. Grimesis the library interface to database files. 41d74f3e32SRuslan ErmilovOne of the supported file formats is 42d74f3e32SRuslan Ermilov.Nm 43d74f3e32SRuslan Ermilovfiles. 4458f0484fSRodney W. GrimesThe general description of the database access methods is in 45d74f3e32SRuslan Ermilov.Xr dbopen 3 , 46d74f3e32SRuslan Ermilovthis manual page describes only the 47d74f3e32SRuslan Ermilov.Nm 48d74f3e32SRuslan Ermilovspecific information. 49d74f3e32SRuslan Ermilov.Pp 50d74f3e32SRuslan ErmilovThe 51d74f3e32SRuslan Ermilov.Nm 52d74f3e32SRuslan Ermilovdata structure is an extensible, dynamic hashing scheme. 53d74f3e32SRuslan Ermilov.Pp 5458f0484fSRodney W. GrimesThe access method specific data structure provided to 55d74f3e32SRuslan Ermilov.Fn dbopen 56d74f3e32SRuslan Ermilovis defined in the 57fe08efe6SRuslan Ermilov.In db.h 58d74f3e32SRuslan Ermilovinclude file as follows: 59d74f3e32SRuslan Ermilov.Bd -literal 6058f0484fSRodney W. Grimestypedef struct { 6158f0484fSRodney W. Grimes u_int bsize; 6258f0484fSRodney W. Grimes u_int ffactor; 6358f0484fSRodney W. Grimes u_int nelem; 6458f0484fSRodney W. Grimes u_int cachesize; 656b99842aSEd Schouten uint32_t (*hash)(const void *, size_t); 6658f0484fSRodney W. Grimes int lorder; 6758f0484fSRodney W. Grimes} HASHINFO; 68d74f3e32SRuslan Ermilov.Ed 69d74f3e32SRuslan Ermilov.Pp 7058f0484fSRodney W. GrimesThe elements of this structure are as follows: 71d74f3e32SRuslan Ermilov.Bl -tag -width indent 72d74f3e32SRuslan Ermilov.It Va bsize 732efeeba5SRuslan ErmilovThe 742efeeba5SRuslan Ermilov.Va bsize 752efeeba5SRuslan Ermilovelement 76d74f3e32SRuslan Ermilovdefines the 77d74f3e32SRuslan Ermilov.Nm 78983419feSAndriy Gapontable bucket size, and is, by default, 4096 bytes. 7958f0484fSRodney W. GrimesIt may be preferable to increase the page size for disk-resident tables 8058f0484fSRodney W. Grimesand tables with large data items. 81d74f3e32SRuslan Ermilov.It Va ffactor 822efeeba5SRuslan ErmilovThe 832efeeba5SRuslan Ermilov.Va ffactor 842efeeba5SRuslan Ermilovelement 85d74f3e32SRuslan Ermilovindicates a desired density within the 86d74f3e32SRuslan Ermilov.Nm 87d74f3e32SRuslan Ermilovtable. 8858f0484fSRodney W. GrimesIt is an approximation of the number of keys allowed to accumulate in any 89d74f3e32SRuslan Ermilovone bucket, determining when the 90d74f3e32SRuslan Ermilov.Nm 91d74f3e32SRuslan Ermilovtable grows or shrinks. 9258f0484fSRodney W. GrimesThe default value is 8. 93d74f3e32SRuslan Ermilov.It Va nelem 942efeeba5SRuslan ErmilovThe 952efeeba5SRuslan Ermilov.Va nelem 962efeeba5SRuslan Ermilovelement 97d74f3e32SRuslan Ermilovis an estimate of the final size of the 98d74f3e32SRuslan Ermilov.Nm 99d74f3e32SRuslan Ermilovtable. 100d74f3e32SRuslan ErmilovIf not set or set too low, 101d74f3e32SRuslan Ermilov.Nm 102d74f3e32SRuslan Ermilovtables will expand gracefully as keys 10358f0484fSRodney W. Grimesare entered, although a slight performance degradation may be noticed. 10458f0484fSRodney W. GrimesThe default value is 1. 105d74f3e32SRuslan Ermilov.It Va cachesize 10658f0484fSRodney W. GrimesA suggested maximum size, in bytes, of the memory cache. 10758f0484fSRodney W. GrimesThis value is 108d74f3e32SRuslan Ermilov.Em only 10958f0484fSRodney W. Grimesadvisory, and the access method will allocate more memory rather 11058f0484fSRodney W. Grimesthan fail. 111d74f3e32SRuslan Ermilov.It Va hash 1122efeeba5SRuslan ErmilovThe 1132efeeba5SRuslan Ermilov.Va hash 1142efeeba5SRuslan Ermilovelement 115d74f3e32SRuslan Ermilovis a user defined 116d74f3e32SRuslan Ermilov.Nm 117d74f3e32SRuslan Ermilovfunction. 118d74f3e32SRuslan ErmilovSince no 119d74f3e32SRuslan Ermilov.Nm 120d74f3e32SRuslan Ermilovfunction performs equally well on all possible data, the 121d74f3e32SRuslan Ermilovuser may find that the built-in 122d74f3e32SRuslan Ermilov.Nm 123d74f3e32SRuslan Ermilovfunction does poorly on a particular 12458f0484fSRodney W. Grimesdata set. 125d74f3e32SRuslan ErmilovUser specified 126d74f3e32SRuslan Ermilov.Nm 127d74f3e32SRuslan Ermilovfunctions must take two arguments (a pointer to a byte 128d74f3e32SRuslan Ermilovstring and a length) and return a 32-bit quantity to be used as the 129d74f3e32SRuslan Ermilov.Nm 13058f0484fSRodney W. Grimesvalue. 131d74f3e32SRuslan Ermilov.It Va lorder 13258f0484fSRodney W. GrimesThe byte order for integers in the stored database metadata. 13358f0484fSRodney W. GrimesThe number should represent the order as an integer; for example, 13458f0484fSRodney W. Grimesbig endian order would be the number 4,321. 13558f0484fSRodney W. GrimesIf 136d74f3e32SRuslan Ermilov.Va lorder 13758f0484fSRodney W. Grimesis 0 (no order is specified) the current host order is used. 13858f0484fSRodney W. GrimesIf the file already exists, the specified value is ignored and the 13958f0484fSRodney W. Grimesvalue specified when the tree was created is used. 140d74f3e32SRuslan Ermilov.El 141d74f3e32SRuslan Ermilov.Pp 142d74f3e32SRuslan ErmilovIf the file already exists (and the 143d74f3e32SRuslan Ermilov.Dv O_TRUNC 144d74f3e32SRuslan Ermilovflag is not specified), the 1452efeeba5SRuslan Ermilovvalues specified for the 146d74f3e32SRuslan Ermilov.Va bsize , ffactor , lorder 14758f0484fSRodney W. Grimesand 148d74f3e32SRuslan Ermilov.Va nelem 1492efeeba5SRuslan Ermilovarguments 150d74f3e32SRuslan Ermilovare 151d74f3e32SRuslan Ermilovignored and the values specified when the tree was created are used. 152d74f3e32SRuslan Ermilov.Pp 153d74f3e32SRuslan ErmilovIf a 154d74f3e32SRuslan Ermilov.Nm 155d74f3e32SRuslan Ermilovfunction is specified, 156d74f3e32SRuslan Ermilov.Fn hash_open 157d74f3e32SRuslan Ermilovwill attempt to determine if the 158d74f3e32SRuslan Ermilov.Nm 159d74f3e32SRuslan Ermilovfunction specified is the same as 160d74f3e32SRuslan Ermilovthe one with which the database was created, and will fail if it is not. 161d74f3e32SRuslan Ermilov.Pp 162d74f3e32SRuslan ErmilovBackward compatible interfaces to the older 163d74f3e32SRuslan Ermilov.Em dbm 164d74f3e32SRuslan Ermilovand 165d74f3e32SRuslan Ermilov.Em ndbm 16613032225SJordan K. Hubbardroutines are provided, however these interfaces are not compatible with 16758f0484fSRodney W. Grimesprevious file formats. 168d74f3e32SRuslan Ermilov.Sh ERRORS 169ef5d438eSPaul TrainaThe 170d74f3e32SRuslan Ermilov.Nm 171ef5d438eSPaul Trainaaccess method routines may fail and set 172d74f3e32SRuslan Ermilov.Va errno 173ef5d438eSPaul Trainafor any of the errors specified for the library routine 174d74f3e32SRuslan Ermilov.Xr dbopen 3 . 175d74f3e32SRuslan Ermilov.Sh SEE ALSO 176d74f3e32SRuslan Ermilov.Xr btree 3 , 177d74f3e32SRuslan Ermilov.Xr dbopen 3 , 178d74f3e32SRuslan Ermilov.Xr mpool 3 , 179d74f3e32SRuslan Ermilov.Xr recno 3 180d74f3e32SRuslan Ermilov.Rs 181d74f3e32SRuslan Ermilov.%T "Dynamic Hash Tables" 182d74f3e32SRuslan Ermilov.%A Per-Ake Larson 183d74f3e32SRuslan Ermilov.%R "Communications of the ACM" 184d74f3e32SRuslan Ermilov.%D April 1988 185d74f3e32SRuslan Ermilov.Re 186d74f3e32SRuslan Ermilov.Rs 187d74f3e32SRuslan Ermilov.%T "A New Hash Package for UNIX" 188d74f3e32SRuslan Ermilov.%A Margo Seltzer 189d74f3e32SRuslan Ermilov.%R "USENIX Proceedings" 190d74f3e32SRuslan Ermilov.%D Winter 1991 191d74f3e32SRuslan Ermilov.Re 192d74f3e32SRuslan Ermilov.Sh BUGS 19358f0484fSRodney W. GrimesOnly big and little endian byte order is supported. 194